Nodexl – Social Network Analysis in Excel

Total Page:16

File Type:pdf, Size:1020Kb

Nodexl – Social Network Analysis in Excel Natasa Milic-Frayling, Microsoft Research Ben Shneiderman, Univ. of Maryland Marc A. Smith, Connected Action • Input devices & strategies • Keyboards, pointing devices, voice • Direct manipulation • Menus, forms, commands • Output devices & formats • Screens, windows, color, sound • Text, tables, graphics • Instructions, messages, help • Collaboration & Social Media • Help, tutorials, training • Search www.awl.com/DTUI • Visualization Fifth Edition: 2010 1) E-commerce & National Priorities • Customer loyalty, community formation • Disaster response, community safety • Health, energy, education, e-government 2) Develop Theories of Social Participation • How do social media networks evolve? • How can participation be increased? 3) Provide Technology Infrastructure • Scalable, reliable, universal, manageable • Protect privacy, stop attacks, resolve conflicts 1) E-commerce & National Priorities • Customer loyalty, community formation • Disaster response, community safety • Health, energy, education, e-government 2) Develop Theories of Social Participation • How do social media networks evolve? • How can participation be increased? 3) Provide Technology Infrastructure • Scalable, reliable, universal, manageable • Protect privacy, stop attacks, resolve conflicts Informal Gathering College Park, MD, April 2009 Article: Science March 2009 BEN SHNEIDERMAN http://iparticipate.wikispaces.com NSF Workshops: Palo Alto & DC www.tmsp.umd.edu Community Informatics Research Network intlsocialparticipation.net E-Commerce Social Media 911.gov • Residents report information • Professionals disseminate instructions • Resident-to-Resident assistance Sending SMS message to 911, includes your phone number, location and time Shneiderman & Preece, Science (Feb. 16, 2007) www.cs.umd.edu/hcil/911gov 911.gov Amber Alert • Residents report information • Professionals disseminate instructions • Resident-to-Resident assistance Sending SMS message to 911, includes your phone number, location and time Shneiderman & Preece, Science (Feb. 16, 2007) www.ncmec.org www.cs.umd.edu/hcil/911gov www.missingkids.com 911.gov Amber Alert • Residents report information • Professionals disseminate instructions • Resident-to-Resident assistance Sending SMS message to 911, includes your phone number, location and time Shneiderman & Preece, Science (Feb. 16, 2007) www.cs.umd.edu/hcil/911gov Health, Energy, Education,… Health, Energy, Education,… Health, Energy, Education,… 1) E-commerce & National Priorities • Customer loyalty, community formation • Disaster response, community safety • Health, energy, education, e-government 2) Develop Theories of Social Participation • How do social media networks evolve? • How can participation be increased? 3) Provide Technology Infrastructure • Scalable, reliable, universal, manageable • Protect privacy, stop attacks, resolve conflicts Network Theories: Evolution models • Random, preferential attachment,… • Monotonic, bursty,… • Power law for degree (hubs & indexes) • Small-world property • Forest fire, spreading activation,… • Matures, decays, fragments, … Watts & Strogatz, Nature 1998; Barabasi, Science 1999, 2009; Newman, Phys. Rev. Letters 2002 Kumar, Novak & Tomkins, KDD2006 Leskovec, Faloutsos & Kleinberg, TKDD2007 Network Theories: Social science • Relationships & roles • Strong & weak ties • Motivations: egoism, altruism, collectivism, principlism • Collective intelligence & action • Leadership & governance • Social information foraging Moreno, 1938; Granovetter, 1971; Burt, 1987; Ostrom, 1992; Wellman, 1993; Batson, Ahmad & Tseng, 2002; Malone, Laubaucher & Dellarocas, 2009; Pirolli, 2009 Network Theories: Stages of participation Wikipedia, Discussion & Reporting • Reader • First-time Contributor (Legitimate Peripheral Participation) • Returning Contributor • Frequent Contributor Preece, Nonnecke & Andrews, CHB2004 Forte & Bruckman, SIGGROUP2005; Hanson, 2008 Porter: Designing for the Social Web, 2008 Vassileva, 2002, 2005; Ling et al., JCMC 2005; Rashid et al., CHI2006 From Reader to Leader: Motivating Technology-Mediated Social Participation All Contributor Collaborator ` Leader Users Reader Preece & Shneiderman, AIS Trans. Human-Computer Interaction1 (1), 2009 aisel.aisnet.org/thci/vol1/iss1/5/ 1) E-commerce & National Priorities • Customer loyalty, community formation • Disaster response, community safety • Health, energy, education, e-government 2) Develop Theories of Social Participation • How do social media networks evolve? • How can participation be increased? 3) Provide Technology Infrastructure • Scalable, reliable, universal, manageable • Protect privacy, stop attacks, resolve conflicts • Mobile, Desktop, Web, Cloud • 100% uptime, 100% secure • Giga-collabs, Tera-contribs • Universal accessibility & usability • Trust, empathy, responsibility, privacy • Leaders can manage usage • Designers can continuously improve Footprints of Human Activity • Footprints in sand as Caesarea Preparation • Own the problem & define the schedule • Data cleaning & conditioning • Handle missing & uncertain data • Extract subsets & link to related information • Integrates statistics & visualization • 4 case studies, 4-8 weeks (journalist, bibliometrician, terrorist analyst & organizational analyst) • Identified desired features, gave strong positive feedback about benefits of integration www.cs.umd.edu/hcil/socialaction Perer & Shneiderman, CHI2008, IEEE CG&A 2009 http://www.youtube.com/watch?v=0M3T65Iw3Ac www.codeplex.com/nodexl www.codeplex.com/nodexl www.codeplex.com/nodexl https://wiki.cs.umd.edu/cmsc734_09/index.php?title=Homework_Number_3 I. Getting Started with Analyzing Social Media Networks 1. Introduction to Social Media and Social Networks 2. Social media: New Technologies of Collaboration 3. Social Network Analysis II. NodeXL Tutorial: Learning by Doing 4. Layout, Visual Design & Labeling 5. Calculating & Visualizing Network Metrics 6. Preparing Data & Filtering 7. Clustering &Grouping III Social Media Network Analysis Case Studies 8. Email 9. Threaded Networks 10. Twitter 11. Facebook 12. WWW 13. Flickr 14. YouTube 15. Wiki Networks www.elsevier.com/wps/find/bookdescription.cws_home/723354/description Challenge: Requires Partitioning • Easy : Only need locally connected vertices e.g Vertex Degree, Eigenvector centrality • Relatively Hard : Need local & some global graph knowledge e.g. Fruchterman-Reingold layout • Hard : Need global graph knowledge at each node e.g. all pairs shortest paths -> betweenness centrality Udayan Khurana Implement and Measure Performance for Fruchterman-Reingold Layout Algorithm GPU GeForce GTX 285, 1476 MHz, 240 cores Host CPU 3 GHz, Intel(R) Core(TM)2 Duo CUDA Graph Name #Nodes #Edges F-R run time F-R run time (seconds) (seconds) CA-AstroPh 18,772 396,160 84 1 cit-HepPh 34,546 421,578 344 1 John Locke Max Scharrenbroich soc-Epinions1 75,879 508,837 152 2 Puneet Sharma soc-Slashdot0811 77,360 905,468 1578 3 Graphs from STANFORD’S SNAP Library soc-Slashdot0902 82,168 948,464 1781 3 (http://snap.stanford.edu/). Researchers who want to - create open tools - generate & host open data - support open scholarship Map, measure & understand social media Support tool projects to collection, analyze & visualize social media data. THANKS !!! to Microsoft External Research http://www.flickr.com/photos/library_of_congress/3295494976/sizes/o/in/photostream/ http://www.flickr.com/photos/amycgx/3119640267/ Location, Location, Location Network of connections among “ecomm” mentioning Twitter users ecomm Position, Position, Position • History: from the dawn of time! • Theory and method: 1934 -> • Jacob L. Moreno • http://en.wikipe dia.org/wiki/Jac ob_L._Moreno SNA 101 • Node A – “actor” on which relationships act; 1-mode versus 2-mode networks • Edge B – Relationship connecting nodes; can be directional C • Cohesive Sub-Group – Well-connected group; clique; cluster A B D E • Key Metrics – Centrality (group or individual measure) D • Number of direct connections that individuals have with others in the group (usually look at incoming connections only) • Measure at the individual node or group level E – Cohesion (group measure) • Ease with which a network can connect • Aggregate measure of shortest path between each node pair at network level reflects average distance – Density (group measure) • Robustness of the network • Number of connections that exist in the group out of 100% possible – Betweenness (individual measure) • # shortest paths between each node pair that a node is on • Measure at the individual node level F G • Node roles – Peripheral – below average centrality – Central connector – above average centrality C – Broker – above average betweenness H D I E http://en.wikipedia.org/wiki/Social_network • Central tenet • Social structure emerges from • the aggregate of relationships (ties) • among members of a population • Phenomena of interest • Emergence of cliques and clusters • from patterns of relationships • Centrality (core), periphery (isolates), • betweenness • Methods Source: Richards, W. (1986). The • Surveys, interviews, observations, NEGOPY network analysis log file analysis, computational program. Burnaby, BC: analysis of matrices Department of Communication, Simon Fraser University. pp.7-16 (Hampton &Wellman, 1999; Paolillo, 2001; Wellman, 2001)y http://en.wikipedia.org/wiki/Centrality • Degree • Closeness • Betweenness • Eigenvector Social Media Network Roles Welser, Howard T., Eric Gleave, Danyel Fisher, and Marc Smith. 2007. Visualizing the Signatures of Social Roles in Online Discussion
Recommended publications
  • Group-In-A-Box Layout for Multi-Faceted Analysis of Communities
    2011 IEEE International Conference on Privacy, Security, Risk, and Trust, and IEEE International Conference on Social Computing Group-In-a-Box Layout for Multi-faceted Analysis of Communities Eduarda Mendes Rodrigues*, Natasa Milic-Frayling †, Marc Smith‡, Ben Shneiderman§, Derek Hansen¶ * Dept. of Informatics Engineering, Faculty of Engineering, University of Porto, Portugal [email protected] † Microsoft Research, Cambridge, UK [email protected] ‡ Connected Action Consulting Group, Belmont, California, USA [email protected] § Dept. of Computer Science & Human-Computer Interaction Lab University of Maryland, College Park, Maryland, USA [email protected] ¶ College of Information Studies & Center for the Advanced Study of Communities and Information University of Maryland, College Park, Maryland, USA [email protected] Abstract—Communities in social networks emerge from One particularly important aspect of social network interactions among individuals and can be analyzed through a analysis is the detection of communities, i.e., sub-groups of combination of clustering and graph layout algorithms. These individuals or entities that exhibit tight interconnectivity approaches result in 2D or 3D visualizations of clustered among the wider population. For example, Twitter users who graphs, with groups of vertices representing individuals that regularly retweet each other’s messages may form cohesive form a community. However, in many instances the vertices groups within the Twitter social network. In a network have attributes that divide individuals into distinct categories visualization they would appear as clusters or sub-graphs, such as gender, profession, geographic location, and similar. It often colored distinctly or represented by a different vertex is often important to investigate what categories of individuals shape in order to convey their group identity.
    [Show full text]
  • Joint Estimation of Preferential Attachment and Node Fitness In
    www.nature.com/scientificreports OPEN Joint estimation of preferential attachment and node fitness in growing complex networks Received: 15 April 2016 Thong Pham1, Paul Sheridan2 & Hidetoshi Shimodaira1 Accepted: 09 August 2016 Complex network growth across diverse fields of science is hypothesized to be driven in the main by Published: 07 September 2016 a combination of preferential attachment and node fitness processes. For measuring the respective influences of these processes, previous approaches make strong and untested assumptions on the functional forms of either the preferential attachment function or fitness function or both. We introduce a Bayesian statistical method called PAFit to estimate preferential attachment and node fitness without imposing such functional constraints that works by maximizing a log-likelihood function with suitably added regularization terms. We use PAFit to investigate the interplay between preferential attachment and node fitness processes in a Facebook wall-post network. While we uncover evidence for both preferential attachment and node fitness, thus validating the hypothesis that these processes together drive complex network evolution, we also find that node fitness plays the bigger role in determining the degree of a node. This is the first validation of its kind on real-world network data. But surprisingly the rate of preferential attachment is found to deviate from the conventional log-linear form when node fitness is taken into account. The proposed method is implemented in the R package PAFit. The study of complex network evolution is a hallmark of network science. Research in this discipline is inspired by empirical observations underscoring the widespread nature of certain structural features, such as the small-world property1, a high clustering coefficient2, a heavy tail in the degree distribution3, assortative mixing patterns among nodes4, and community structure5 in a multitude of biological, societal, and technological networks6–11.
    [Show full text]
  • Networkx: Network Analysis with Python
    NetworkX: Network Analysis with Python Salvatore Scellato Full tutorial presented at the XXX SunBelt Conference “NetworkX introduction: Hacking social networks using the Python programming language” by Aric Hagberg & Drew Conway Outline 1. Introduction to NetworkX 2. Getting started with Python and NetworkX 3. Basic network analysis 4. Writing your own code 5. You are ready for your project! 1. Introduction to NetworkX. Introduction to NetworkX - network analysis Vast amounts of network data are being generated and collected • Sociology: web pages, mobile phones, social networks • Technology: Internet routers, vehicular flows, power grids How can we analyze this networks? Introduction to NetworkX - Python awesomeness Introduction to NetworkX “Python package for the creation, manipulation and study of the structure, dynamics and functions of complex networks.” • Data structures for representing many types of networks, or graphs • Nodes can be any (hashable) Python object, edges can contain arbitrary data • Flexibility ideal for representing networks found in many different fields • Easy to install on multiple platforms • Online up-to-date documentation • First public release in April 2005 Introduction to NetworkX - design requirements • Tool to study the structure and dynamics of social, biological, and infrastructure networks • Ease-of-use and rapid development in a collaborative, multidisciplinary environment • Easy to learn, easy to teach • Open-source tool base that can easily grow in a multidisciplinary environment with non-expert users
    [Show full text]
  • Measuring Homophily
    Measuring Homophily Matteo Cristani, Diana Fogoroasi, and Claudio Tomazzoli University of Verona fmatteo.cristani, diana.fogoroasi.studenti, [email protected] Abstract. Social Network Analysis is employed widely as a means to compute the probability that a given message flows through a social net- work. This approach is mainly grounded upon the correct usage of three basic graph- theoretic measures: degree centrality, closeness centrality and betweeness centrality. We show that, in general, those indices are not adapt to foresee the flow of a given message, that depends upon indices based on the sharing of interests and the trust about depth in knowledge of a topic. We provide new definitions for measures that over- come the drawbacks of general indices discussed above, using Semantic Social Network Analysis, and show experimental results that show that with these measures we have a different understanding of a social network compared to standard measures. 1 Introduction Social Networks are considered, on the current panorama of web applications, as the principal virtual space for online communication. Therefore, it is of strong relevance for practical applications to understand how strong a member of the network is with respect to the others. Traditionally, sociological investigations have dealt with problems of defining properties of the users that can value their relevance (sometimes their impor- tance, that can be considered different, the first denoting the ability to emerge, and the second the relevance perceived by the others). Scholars have developed several measures and studied how to compute them in different types of graphs, used as models for social networks. This field of research has been named Social Network Analysis.
    [Show full text]
  • Modeling Customer Preferences Using Multidimensional Network Analysis in Engineering Design
    Modeling customer preferences using multidimensional network analysis in engineering design Mingxian Wang1, Wei Chen1, Yun Huang2, Noshir S. Contractor2 and Yan Fu3 1 Department of Mechanical Engineering, Northwestern University, Evanston, IL 60208, USA 2 Science of Networks in Communities, Northwestern University, Evanston, IL 60208, USA 3 Global Data Insight and Analytics, Ford Motor Company, Dearborn, MI 48121, USA Abstract Motivated by overcoming the existing utility-based choice modeling approaches, we present a novel conceptual framework of multidimensional network analysis (MNA) for modeling customer preferences in supporting design decisions. In the proposed multidimensional customer–product network (MCPN), customer–product interactions are viewed as a socio-technical system where separate entities of `customers' and `products' are simultaneously modeled as two layers of a network, and multiple types of relations, such as consideration and purchase, product associations, and customer social interactions, are considered. We first introduce a unidimensional network where aggregated customer preferences and product similarities are analyzed to inform designers about the implied product competitions and market segments. We then extend the network to a multidimensional structure where customer social interactions are introduced for evaluating social influence on heterogeneous product preferences. Beyond the traditional descriptive analysis used in network analysis, we employ the exponential random graph model (ERGM) as a unified statistical
    [Show full text]
  • Multidimensional Network Analysis
    Universita` degli Studi di Pisa Dipartimento di Informatica Dottorato di Ricerca in Informatica Ph.D. Thesis Multidimensional Network Analysis Michele Coscia Supervisor Supervisor Fosca Giannotti Dino Pedreschi May 9, 2012 Abstract This thesis is focused on the study of multidimensional networks. A multidimensional network is a network in which among the nodes there may be multiple different qualitative and quantitative relations. Traditionally, complex network analysis has focused on networks with only one kind of relation. Even with this constraint, monodimensional networks posed many analytic challenges, being representations of ubiquitous complex systems in nature. However, it is a matter of common experience that the constraint of considering only one single relation at a time limits the set of real world phenomena that can be represented with complex networks. When multiple different relations act at the same time, traditional complex network analysis cannot provide suitable an- alytic tools. To provide the suitable tools for this scenario is exactly the aim of this thesis: the creation and study of a Multidimensional Network Analysis, to extend the toolbox of complex network analysis and grasp the complexity of real world phenomena. The urgency and need for a multidimensional network analysis is here presented, along with an empirical proof of the ubiquity of this multifaceted reality in different complex networks, and some related works that in the last two years were proposed in this novel setting, yet to be systematically defined. Then, we tackle the foundations of the multidimensional setting at different levels, both by looking at the basic exten- sions of the known model and by developing novel algorithms and frameworks for well-understood and useful problems, such as community discovery (our main case study), temporal analysis, link prediction and more.
    [Show full text]
  • Synthetic Graph Generation for Data-Intensive HPC Benchmarking: Background and Framework
    ORNL/TM-2013/339 Synthetic Graph Generation for Data-Intensive HPC Benchmarking: Background and Framework October 2013 Prepared by Joshua Lothian, Sarah Powers, Blair D. Sullivan, Matthew Baker, Jonathan Schrock, Stephen W. Poole DOCUMENT AVAILABILITY Reports produced after January 1, 1996, are generally available free via the U.S. Department of Energy (DOE) Information Bridge: Web Site: http://www.osti.gov/bridge Reports produced before January 1, 1996, may be purchased by members of the public from the following source: National Technical Information Service 5285 Port Royal Road Springfield, VA 22161 Telephone: 703-605-6000 (1-800-553-6847) TDD: 703-487-4639 Fax: 703-605-6900 E-mail: [email protected] Web site: http://www.ntis.gov/support/ordernowabout.htm Reports are available to DOE employees, DOE contractors, Energy Technology Data Ex- change (ETDE), and International Nuclear Information System (INIS) representatives from the following sources: Office of Scientific and Technical Information P.O. Box 62 Oak Ridge, TN 37831 Telephone: 865-576-8401 Fax: 865-576-5728 E-mail: [email protected] Web site:http://www.osti.gov/contact.html This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or other- wise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States Government or any agency thereof.
    [Show full text]
  • Preferential Attachment Model with Degree Bound and Its Application to Key Predistribution in WSN
    Preferential Attachment Model with Degree Bound and its Application to Key Predistribution in WSN Sushmita Rujy and Arindam Palz y Indian Statistical Institute, Kolkata, India. Email: [email protected] z TCS Innovation Labs, Kolkata, India. Email: [email protected] Abstract—Preferential attachment models have been widely particularly those in the military domain [14]. The resource studied in complex networks, because they can explain the constrained nature of sensors restricts the use of public key formation of many networks like social networks, citation methods to secure communication. Key predistribution [7] networks, power grids, and biological networks, to name a few. Motivated by the application of key predistribution in wireless is a widely used symmetric key management technique in sensor networks (WSN), we initiate the study of preferential which cryptographic keys are preloaded in sensor networks attachment with degree bound. prior to deployment. Sensor nodes find out the common keys Our paper has two important contributions to two different using a shared key discovery phase. Messages are encrypted areas. The first is a contribution in the study of complex by the source node using the shared key and decrypted at the networks. We propose preferential attachment model with degree bound for the first time. In the normal preferential receiving node using the same key. attachment model, the degree distribution follows a power law, The number of keys in each node is to be minimized, in with many nodes of low degree and a few nodes of high degree. order to reduce storage space. Direct communication between In our scheme, the nodes can have a maximum degree dmax, any pair of nodes help in quick and easy transmission of where dmax is an integer chosen according to the application.
    [Show full text]
  • Bellwethers and the Emergence of Trends in Online Communities
    Bellwethers and the Emergence of Trends in Online Communities Yasuaki Sakamoto ([email protected]) Elliot Sadlon ([email protected]) Jeffrey V. Nickerson ([email protected]) Center for Decision Technologies Howe School of Technology Management, Stevens Institute of Technology Castle Point on Hudson, Hoboken, NJ 07030 USA Abstract Group-level phenomena, such as trends and congestion, are difficult to predict as behaviors at the group-level typically di- verge from simple aggregates of behaviors at the individual- level. In the present work, we examine the processes by which collective decisions emerge by analyzing how some arti- cles gain vast popularity in a community-based website, Digg. Through statistical analyses and computer simulations of hu- man voting processes under varying social influences, we show that users’ earlier choices have some influence on the later choices of others. Moreover, the present results suggest that there are special individuals who attract followers and guide the development of trends in online social networks. Keywords: Trends, trendsetters, group behavior, social influ- ence, social networks. Figure 1: A snapshot of Digg homepage. Background An individual’s decisions are often influenced by the context the social (Levine, Resnick, & Higgins, 1993) and distributed or the environment in which the decisions are made. For ex- (Hutchins, 1995) nature of learning and thinking in cognitive ample, preferences between two choices can change when a science (Goldstone & Janssen, 2005; Harnad & Dror, 2006). third option is introduced (Tversky, 1972). At the same time, The past work in collective behavior tends to focus on peo- an individual’s actions alter the environments. By modifying ple’s behavior in controlled laboratory experiments (Gureckis their surroundings, humans indirectly communicate to one & Goldstone, 2006), following the tradition of research in in- another and influence one another’s cognition.
    [Show full text]
  • Albert-László Barabási with Emma K
    Network Science Class 5: BA model Albert-László Barabási With Emma K. Towlson, Sebastian Ruf, Michael Danziger and Louis Shekhtman www.BarabasiLab.com Section 1 Introduction Section 1 Hubs represent the most striking difference between a random and a scale-free network. Their emergence in many real systems raises several fundamental questions: • Why does the random network model of Erdős and Rényi fail to reproduce the hubs and the power laws observed in many real networks? • Why do so different systems as the WWW or the cell converge to a similar scale-free architecture? Section 2 Growth and preferential attachment BA MODEL: Growth ER model: the number of nodes, N, is fixed (static models) networks expand through the addition of new nodes Barabási & Albert, Science 286, 509 (1999) BA MODEL: Preferential attachment ER model: links are added randomly to the network New nodes prefer to connect to the more connected nodes Barabási & Albert, Science 286, 509 (1999) Network Science: Evolving Network Models Section 2: Growth and Preferential Sttachment The random network model differs from real networks in two important characteristics: Growth: While the random network model assumes that the number of nodes is fixed (time invariant), real networks are the result of a growth process that continuously increases. Preferential Attachment: While nodes in random networks randomly choose their interaction partner, in real networks new nodes prefer to link to the more connected nodes. Barabási & Albert, Science 286, 509 (1999) Network Science: Evolving Network Models Section 3 The Barabási-Albert model Origin of SF networks: Growth and preferential attachment (1) Networks continuously expand by the GROWTH: addition of new nodes add a new node with m links WWW : addition of new documents PREFERENTIAL ATTACHMENT: (2) New nodes prefer to link to highly the probability that a node connects to a node connected nodes.
    [Show full text]
  • Information Thermodynamics and Reducibility of Large Gene Networks
    Supplementary Information: Information Thermodynamics and Reducibility of Large Gene Networks Swarnavo Sarkar#, Joseph B. Hubbard, Michael Halter, and Anne L. Plant* National Institute of Standards and Technology, Gaithersburg, MD 20899, USA #[email protected] *[email protected] S1. Generating model GRNs All the model GRNs presented in the main text were generated using the NetworkX package (version 2.5) for Python. Specifically, the barabasi_albert_graph function was used to create graphs using the Barabási-Albert preferential attachment model [1]. The barabasi_albert_graph(n, m) function requires two inputs: (1) the number of nodes in the graph, �, and (2) the number of edges connecting a new node to existing nodes in the graph, �, and produces an undirected graph. The documentation for the barabasi_albert_graph functiona fully describes the algorithm for generating the graphs from the inputs � and �. We then convert the undirected Barabási-Albert graph into a directed one. In the NetworkX graph object, an undirected edge between nodes �! and �" is equivalent to a directed edge from �! to �" and also a directed edge from �" to �!. We transformed the undirected Barabási-Albert graphs into directed graphs by deleting any edge from �! to �" when the node numbers constituting the edge satisfy the condition, � > �. This deletion results in every node in the graph having the same in-degree, �, without any constraint on the out-degree. The final graph object, � = (�, �), contains vertices numbered from 0 to � − 1, and each directed edge �! → �" in the set � is such that � < �. A source node �! can only send information to node numbers higher than itself. Hence, the non-trivial values in the loss field, �(� → �), (as shown in figures 2b and 2c) are confined within the upper diagonal, � < �.
    [Show full text]
  • NODEXL for Beginners Nasri Messarra, 2013‐2014
    NODEXL for Beginners Nasri Messarra, 2013‐2014 http://nasri.messarra.com Why do we study social networks? Definition from: http://en.wikipedia.org/wiki/Social_network: A social network is a social structure made up of a set of social actors (such as individuals or organizations) and a set of the dyadic ties between these actors. Social networks and the analysis of them is an inherently interdisciplinary academic field which emerged from social psychology, sociology, statistics, and graph theory. From http://en.wikipedia.org/wiki/Sociometry: "Sociometric explorations reveal the hidden structures that give a group its form: the alliances, the subgroups, the hidden beliefs, the forbidden agendas, the ideological agreements, the ‘stars’ of the show". In social networks (like Facebook and Twitter), sociometry can help us understand the diffusion of information and how word‐of‐mouth works (virality). Installing NODEXL (Microsoft Excel required) NodeXL Template 2014 ‐ Visit http://nodexl.codeplex.com ‐ Download the latest version of NodeXL ‐ Double‐click, follow the instructions The SocialNetImporter extends the capabilities of NodeXL mainly with extracting data from the Facebook network. To install: ‐ Download the latest version of the social importer plugins from http://socialnetimporter.codeplex.com ‐ Open the Zip file and save the files into a directory you choose, e.g. c:\social ‐ Open the NodeXL template (you can click on the Windows Start button and type its name to search for it) ‐ Open the NodeXL tab, Import, Import Options (see screenshot below) 1 | Page ‐ In the import dialog, type or browse for the directory where you saved your social importer files (screenshot below): ‐ Close and open NodeXL again For older Versions: ‐ Visit http://nodexl.codeplex.com ‐ Download the latest version of NodeXL ‐ Unzip the files to a temporary folder ‐ Close Excel if it’s open ‐ Run setup.exe ‐ Visit http://socialnetimporter.codeplex.com ‐ Download the latest version of the socialnetimporter plug in 2 | Page ‐ Extract the files and copy them to the NodeXL plugin direction.
    [Show full text]